It’s critical to stay current with the technology that runs your organization and secures your operational infrastructure. INTERFACE addresses these IT issues through informative, non-sales oriented, educational seminars customized to the specific needs of the local business community. Using case studies and best practice examples, these exhibitor-presented sessions offer you the solutions needed to address your technology challenges and achieve your organizational goals.
An update of today’s attacks in cyber security, including malware and wireless attacks.
From insiders to sophisticated external attackers, the reality of cyber security today is that the threat is already inside. Legacy approaches to cyber security, which rely on knowledge of past attacks, are simply not sufficient to combat new, evolving attacks, and no human cyber analyst can watch this much or react quickly enough. A fundamentally new approach to cyber defense is needed to detect and respond to threats that are already inside the network before they turn into a full-blown crisis.
Self-learning systems, which represent a fundamental step-change in automated cyber defense, are relied upon by organizations around the world and can cover up to millions of devices. Based on machine learning and probabilistic mathematics, these new approaches to security can establish a highly accurate understanding of normal behavior by learning an organization’s ‘pattern of life’. They can spot abnormal activity as it emerges, and even take precise, measured actions to automatically curb the threat. Discover why autonomous response and machine learning are the future of defense and how the ‘immune system’ approach to cyber security provides complete network visibility and the ability to prioritize threats in order to better allocate time and resources.
This session will discuss the current state of platform security, and explore alternative approaches proposed by leading members of the security industry. It will include discussions around Cloud, CASB, Google’s BeyondCorp framework, and others. The intent is to bring to light why so many industry leaders are calling for a new approach to security, and define what is needed in this new model.
The IT landscape today has a very different attach surface than the traditional data center. Modern assets like cloud instances, web-based applications, mobile devices, application containers, and others have different characteristics that can affect your security and risk management program if not managed appropriately. You may not think these modern assets affect you, but in this presentation, you’ll learn how common they are in organizations today and the impact they’re having on your attack surface.
The details of this presentation will be available soon. Please check back for updates!
The theft of intellectual property or trade secret information may cost the U.S. between $300-$400 billion dollars a year and result in the net loss of millions of jobs. The protection of business secrets is therefore of great importance to our economy. This presentation will describe some of the cyber and insider threats to business secrets and suggest some possible mitigating actions. The presentation will also highlight the importance of working with the FBI and other law enforcement agencies to neutralize the threats to business and academia.
Bio: Byron Franz is a Special Agent of the Federal Bureau of Investigation (FBI) and has worked national security matters for over 20 years. He currently serves on FBI Milwaukee’s Cyber Squad, where his job is to raise awareness of cyber and insider threats to business, academia, and state/local governments. He holds a B.A. in Russian and a law degree, both from the University of Wisconsin-Madison.
Flash memory is revolutionizing data storage, bringing an unprecedented level of performance that legacy storage systems simply can’t match. Learn how to simplify you data management process and get the power of array-based snapshots, replication and cloning without being storage experts.
Your organization is always running and can’t afford downtime during a disaster or the traditional time it takes to recover from one. Backup solutions don’t solve these problems as they are not true Disaster Recovery for the business. What types of disasters will impact the business? Learn about Disaster Recovery scenarios, and also the questions to ask and answer when planning your Disaster Recovery solution to drive true IT resilience. Learn which decisions impact the business in which ways, and how to avoid making sacrifices for your always-on organization.
Cyber Threats are only increasing. Attackers are shifting their tactics as we shift our security strategies. Join us for a discussion about the ever changing threat landscape and how you can more effectively protect your company from these threats. In this session we will talk about how cyber threats increased in 2016, where attackers are shifting to, and what industry experts are recommending to address these shifts.
In this presentation, attendees will learn how organizations can protect themselves from zero-day threats regardless of vector or attack surface. Whether it be on the corporate network, remote, using cloud services, or on a mobile device.
Whether on-network or off, how do you ensure that nothing bad comes in and nothing good leaks out? Are you able to see all the traffic, including that which is SSL encrypted, even when working from home or an airport? Is the security policy the same no matter what the location is? And, can you say with full confidence, that your security program is better than 90% of your peers in other companies and getting better? And finally, do you have the CFO doing backflips? If not, this is the presentation for you.
|Bob Turner||CISO||University of Wisconsin|
|Brian Sagedal||President elect||PMI|
|Dawn Toth||Sr IT Risk Analyst||QBE Insurance Group|
|Dean Winger||Manager, IT & Infrastructure Services||UW, Madison School of Education|
|Erik Lindwall||Director of Information Technology||C.D.Smith Construction|
|Gustavo Hinojosa||Outreach Coordinator||ISSA|
|James Oryszczyn||Director, Security & Network Services||Quarles & Brady LLP|
|Jay Walker||IT Director||Net Technology (PMI)|
|Jeffrey Jones||Director, Information Technology||MetalTek International|
|Jennifer Jirochvong||IT Applications Supervisor||Agnesian HealthCare|
|Jim Padley||Director, Information Technology||Stoughton Trailers, LLC.|
|Josh Krzych||Director of Technical Services||Organic Valley|
|Jurate Pranskute||Manager, It Security & Compliance||Regal|
|Kelly Mack||Sr IT Internal Auditor||WPS Health Solutions|
|Ken Shaurette||Director IT Services||Fipco|
|Kurt Moore||Chapter Chair||ASIS|
|Matthew McCormick||CTO||Technology Decisions, LLC|
|Mike Block||President||ISSA Milwaukee|
|Mindy Walker||Director, Internal Audit||WPS Health Solutions|
|Nelson Luk||Manager, Business Risk||Thrivent Financial|
|Rod Gabriel||Co-Leader||Wisconsin VMUG|
|Roland Welsch||Manager, Information Technology||Jefferson County, WI|
|Ryan Peissig||Enterprise Architect||Agnesian HealthCare|
|Scott Noles||Manager, Information Technology||J.H. Findorff & Son INC.|
|Tammy Goss||VP of Programs||ARMA|
|Yvonne Subak||VP of Membership||ARMA|
Monona Terrace Community and Convention Center
1 John Nolen Dr,
Madison, WI 53703
The Monona Terrace parking ramp has approximately 400 spaces for general event use during normal business hours Monday through Friday. An additional 200 spaces are available on evenings and weekends. For current rates, please consult with your Event Coordinator
Check Back Soon for Directions